این دوره بصورت فشرده شامل سرفصل دوره های F5 BIG-IP Administration & Troubleshooting و F5 BIG-IP LTM Administration و F5 BIG-IP ASM/AWAF Administration می باشد. قطعا جهت آشنایی حرفه ای تر و درک عمیق تر سرفصل های این دوره، گذراندن دوره Advanced + Workshop نیز پیشنهاد می شود.

 

پیش‌ نیاز دوره:

 

  • Network+
  • Security+
  • HTTP Protocol Security
  • CCNP R&S

مدت زمان دوره: 120 ساعت

مدرس دوره: مهندس پرهام امام جمعه

 

سرفصل دوره:

 

F5 BIG-IP Administration and Troubleshooting

  • Application Delivery Controller – Deployment Method
  • BIG-IP Terminology and Concepts
  • VLAN, Self-IP, Floating-IP and Access Management
  • Pool, Pool Member and Node
  • Configuration of Different Pool Monitors
  • NAT, SNAT and DNAT configuration
  • Full-proxy Architecture with NAT Operation
  • Configuration of Important Traffic Profiles
  • HA (High Availability) Configuration and Fail-safe
  • Hardware Diagnostics
  • TMSH Commands for BIG-IP Administration
  • TCPDUMP Command for Traffic Capturing
  • AOM (Always-On Management)
  • Leveraging iHealth to Check Functional Status of Device
  • Software and Configuration Maintenance
  • Creating Backup Files and Restoring Backup
  • Administrative Partitions
  • Different User Roles
  • F5 BIG-IP Maintenance
  • External APIs, Programming or Automation Interfaces
  • F5 Support Resources and Tools
  • APPENDIX: TMOS v12.0, v13.0, v14.0, v15.0 (New Features)

 

F5 BIG-IP LTM Administration

  • Introduction to Load-balancers
  • Load-balancers and Deployment Methods
  • Load-balancer Terminology and Concepts
  • VLAN, Self-IP, Floating-IP and Access Management
  • Working With Administrative Partitions and Route Domains (VRFs)
  • Configuration Local Traffic Policies for HTTP Traffic Management
  • Intelligent Traffic Management via iRule Scripts
  • Load-balancing Methods, Applications and Configuration
  • VS (Virtual Server) Types, Applications and Configuration
  • Advanced HA (High Availability) Configuration

 

F5 BIG-IP ASM/AWAF Administration

  • Web Application Security
  • OWASP- Top 10 Application Security Risks
  • OWASP Automated Threat Events
  • WEB Application Vulnerability Reports (2020)
  • WAF Deployment Methods
  • Introduction to F5-ASM
  • F5 AWAF (Advanced WAF)
  • Application Security Policies
  • Application Security Policy Entities
  • Attack Signatures Management
  • Fine-tuning of Security Policies
  • Additional Application Security Protections
  • DoS Attacks Detection and Mitigation
  • Brute Force Attacks Detection and Mitigation
  • Web Scraping Attacks Detection and Mitigation
  • Using iRule Scripts with ASM/AWAF
  • HA (High Availability) Configuration
  • Important User Accounts
  • Checking Health, Logs and Reports